This paper presents a multi-agent system for security control on industrial environments. The system uses a set of wireless technologies and software agents which integrate reasoni...
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Malicious insiders’ difficult-to-detect activities pose serious threats to the intelligence community (IC) when these activities go undetected. A novel approach that integrates ...
Svetlana Symonenko, Elizabeth D. Liddy, Ozgur Yilm...
In this paper, we discuss new analytical methods for computing Value-at-Risk (VaR)andacreditexposureprofile.UsingaMonteCarlosimulationapproachasabenchmark, we find that the analy...
Ben De Prisco, Ian Iscoe, Alexander Y. Kreinin, Ah...
— Jobs on the Grid require security credentials throughout their run for accessing secure Grid resources, such as GridFTP data repositories. However, delegating long-lived creden...